Bugzilla – Attachment 1426 Details for
Bug 1360
Connection aborted on large data -R transfer
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
Set correct SSH packet size in remote TCP forwarding and agent forwarding.
openssh-client-tcpip-packetdefsize.patch (text/plain), 1.01 KB, created by
Darren Tucker
on 2007-12-29 07:33:16 AEDT
(
hide
)
Description:
Set correct SSH packet size in remote TCP forwarding and agent forwarding.
Filename:
MIME Type:
Creator:
Darren Tucker
Created:
2007-12-29 07:33:16 AEDT
Size:
1.01 KB
patch
obsolete
>Index: clientloop.c >=================================================================== >RCS file: /usr/local/src/security/openssh/cvs/openssh/clientloop.c,v >retrieving revision 1.170 >diff -u -p -r1.170 clientloop.c >--- clientloop.c 28 Dec 2007 15:45:07 -0000 1.170 >+++ clientloop.c 28 Dec 2007 18:14:10 -0000 >@@ -1745,7 +1745,7 @@ client_request_forwarded_tcpip(const cha > } > c = channel_new("forwarded-tcpip", > SSH_CHANNEL_CONNECTING, sock, sock, -1, >- CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_WINDOW_DEFAULT, 0, >+ CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0, > originator_address, 1); > xfree(originator_address); > xfree(listen_address); >@@ -1803,7 +1803,7 @@ client_request_agent(const char *request > return NULL; > c = channel_new("authentication agent connection", > SSH_CHANNEL_OPEN, sock, sock, -1, >- CHAN_X11_WINDOW_DEFAULT, CHAN_TCP_WINDOW_DEFAULT, 0, >+ CHAN_X11_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0, > "authentication agent connection", 1); > c->force_drain = 1; > return c;
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Flags:
dtucker
:
ok?
Actions:
View
|
Diff
Attachments on
bug 1360
:
1349
|
1425
| 1426